Expert Guidance
We have handcrafted fantastic articles just for you! Experts write them for everyday people, not fellow cyber gurus.
GUIDANCE VIA WRITTEN WORD
Featured Articles
Want to write for decodingCyber? Find out how, here!
Articles
Quickly search our vast article collection!
In the Crosshairs: 4 Principles for Assessing the Likelihood of a Cyberattack
You’ll learn how to assess the likelihood of a cyberattack on your business. Our goal is to help you clearly and systematically consider how susceptible you are to an attack and act on that knowledge proactively and proactively.
Preparing For the Next Wave of Data Privacy Obligations
Some things just are better together. Peanut butter and jelly. Coffee and cream. Batman and Robin. Salt and pepper. Security and privacy.
How the SBOM Executive Order Helps Improve Cybersecurity
In the wake of major cyberattacks, such as December 2021’s Log4Shell, Congress and federal agencies have ramped up requirements for transparency in software supply chains. Software vendors are facing new requirements, including providing a software bill of materials, or SBOM, which can help improve cybersecurity measures.
Why You Need a Cyber Expert on Your Board of Directors
Cybersecurity has been a business risk for decades. The board of directors (BoD) has a responsibility to help manage that risk, but most BoDs don’t even have a cyber expert.
Advice for Leaders—Think Like Your Adversary
How do cyber bad actors, a.k.a., our adversaries, think? Easy, like the rest of us. Well, with a slightly different optic. If you're leading an organization, you are charged with staying one step ahead of your adversaries — your data, earnings, and business future depend on it.
Understanding and Mitigating Cybersecurity Supply Chain Risks
Protecting your company from cyber threats is hard enough — so why worry about anyone else? Because of supply chains. Because of Tier 1, Tier 2, and Tier 3 suppliers. Because you hire consultants and they hire subcontractors, every one of them is a potential vulnerability.
Building a Cybersecurity Team Structure: Best Practices
Every organization has a cybersecurity team. Some teams are big, some are small. Some invest a lot in protecting their companies, while others … take risks. It all depends.
Zero Trust Security Explained: Strategies for a Secure Digital Future
The world runs on trust, and cybersecurity is no different. Just as you take an elevator without worrying about it crashing, you shop online because you trust that your money and data are safe. How does that happen? Because of a cybersecurity model called zero trust.
Mastering Defense in Depth: A Comprehensive Guide for Cybersecurity
One of the hardest things about cyber is that no measure is 100% effective forever — which makes defense in depth one of the essential cybersecurity frameworks.
Cybersecurity is not Privacy
You've spent time, effort, and money building a solid cybersecurity structure for your organization. You believe you have privacy — specifically, data privacy — also covered.
Advice for Leaders—A CISO Needs to be a Leader First
Overlooking the importance of leadership can be a fatal error for an organization. Yet, in cybersecurity leadership today, leadership is often overlooked. But why?
Attack Surface Management: Strategies for Cybersecurity and Risk Reduction
In cybersecurity, attack surface management is a critical defense measure — but requires you to think like a criminal. What does that mean?
Why the CISO Needs to Report to the CEO and Share Insights with the BoD
In a business landscape saturated with cyber bad actors, a Chief Information Security Officer (CISO) is critical for success. So why isn’t every CISO reporting to the CEO? And why do CISOs not always get to talk to the Board of Directors (BoD)?
Your learning journey starts now.
Let us help you find the right persona for you!
"By failing to prepare, you are preparing to fail."
- Benjamin Franklin